PROVIDING TOP-TIER TALENT + EMPOWERING THEM TO MAKE A DIFFERENCE


Following his experience in Silicon Valley with Apple, Brian Carlin, the founder and CEO of Purple Jay, aspired to establish a company that offers exceptional information security personnel, IT engineers, and application developers to the Government. The primary objective was to assist in advancing their missions, streamlining workflows, and fortifying their systems.

OUR PURPOSE


We aim to guide your organization into the right balance of business productivity and implement security measures to maximize outcomes. We understand that effective cybersecurity solutions must go beyond simply protecting data and systems – they must align with your mission so that they will enable and empower your organization.

THE MISSION


We intend to provide cross-domain services with highly skilled and trained personnel supported by cross-matrix, agile teams and proprietary digital solutions with a track record of success. This positively charged approach will exceed clients minimum requirements, reduce client and organizational risk, and maximize the return on investment.

ATTENTION TO DETAIL MATTERS

PURPLE JAY EXPLAINED

WHY THE COLOR PURPLE?

The concept of "Purple" symbolizes the ongoing collaboration between the "Red" and "Blue" teams, representing offense and defense, respectively. This represents a noteworthy paradigm shift in modern information security programs, aiming to enhance effectiveness and cater to the constantly evolving requirements of clients, companies, and government agencies. Embracing the "Purple" mindset acknowledges the importance of simultaneously playing offense and defense to achieve excellence.

WHY A JAYBIRD?

Jaybirds possess traits of curiosity, assertiveness, and intellect. Additionally, they are recognized for raising the alarm when they sense potential dangers, prioritizing the safety of others. We firmly believe that achieving success entails cultivating inquisitive minds while prioritizing our clients' well-being. Our objective is to inquire, explore further, foster creativity, instill confidence, and exhibit assertiveness in order to effectively optimize business and safeguard our clients.

WHY THE HONEYCOMB?

The construction of a beehive thrives on teamwork, communication, and unwavering nurturing. It necessitates adaptation to a constantly changing environment through meticulous planning and timely anticipation, shielding the hive from surrounding threats and vulnerabilities. We recognize that these elements are vital for delivering cross-domain, cross-matrix services, and innovative solutions

CLEARANCE & CERTIFICATIONS

TOP TIER + HIGHLY SKILLED

Purple Jay operations are DCAA-Compliant

Personnel holds a variety of notable certifications.

TRACK RECORD OF SUCCESS

ACHIEVEMENTS AND OUTCOMES

Purple Jay is privileged to enable the business and mission of a variety of Government and Commercial clients through sole source and teaming agreements with outstanding partners. The utilization of our primary services and pre-flight solutions has a track record of success increasing productivity, modernizing infrastructure, and sensibly securing systems.


INFOSEC DATA FUSION EFFORTS

Our InfoSec SMEs and Data Analysts identified key cyber operations and compliance datasets across organizational divisions, building interdependent relationships to tailor a unique ETL and queryable database, enabling enhanced visibility and tracking of governance KPIs against FISMA requirements.

KEY ACHIEVEMENT: Improved visibility gap enabling OCIO with Governance BI aiding data-informed security & compliance strategy


COMPLIANCE PORTAL (DASHBOARD)

Our Developers, with support from InfoSec SMEs and CSPO, worked directly with Client Stakeholders to tailor TAWNY components for a Compliance Dashboard, providing BI to increase compliance accountability, enhance security posture visibility, and improve governance reporting accuracy.

KEY ACHIEVEMENT: Agency FISMA Score improved


ST&E ONGOING ASSESSMENT

Our SMEs execute ongoing application and system testing and evaluation (ST&E) to support authorization and continuous monitoring requirements to assess risk appropriately with each system change and application release.

KEY ACHIEVEMENT: Developed Ansible scripts to optimize STIG hardening and streamline ST&E, improving accuracy and reducing assessment time to a few days


VULNERABILITY MANAGEMENT AUTOMATION

Our Developers, with support from InfoSec SMEs, worked to tailor HERON components for a web app that ingests vulnerability scans (NESSUS, SonarQube, SCAP, etc.), automates categorization, outputs vuln change management logs, and stores remediation plans.

KEY ACHIEVEMENT: Streamlined continuous monitoring activities with security documentation (POA&M Report) and VM reporting as a CI/CD pipeline and automated build process


SECURITY AUTHORIZATION DOCUMENTATION

Our cross-matrix partnership between InfoSec SMEs and developers optimized the generation of the SSP, SAP, SAR, POA&M as well as the maintenance of the RMF package.

KEY ACHIEVEMENT: Developed Documentation CI/CD pipeline automating SSP development and management, including multi-formatted (.doc, .pdf., JSON, . XML) exports. Obtained ATC and ongoing ATO.


IT MODERNIZATION & THREAT DETECTION

Our SMEs modernized and migrated corporate infrastructure from a legacy on-premise approach to a scalable cloud with idempotent processes. Modernization included managed end-points and other managed InfoSec services.

KEY ACHIEVEMENT: Improved corporate security posture with sensible access controls and implemented accountability and audit functions. Increase business productivity through SaaS solutions and training.


POA&M OPTIMIZATION WITH CVSS

Our SMEs worked with client VM and ConMon teams to drastically enhance business workflow by parsing Vuln Scans into a manageable FedRAMP-approved POA&M while aligning ALAS numbers to CVSS satisfying regulatory expectations.

KEY ACHIEVEMENT: Reduced manual workload and processes down from 3 days to less than a day. Programmatically aligned organization workflows to meet regulatory expectations


FULL STACK WEB APP DEVELOPMENT

A cross-matrix team (Product Owner, BI SME, and Developer) tailored TAWNY components into a Full Stack web app that automates unique business workflows, provides BI insights and dashboards, and outputs state-compliant reports.

KEY ACHIEVEMENT: Deployed a unique SaaS solution that provided business scalability, RBAC functions, and increased business and compliance accuracy

CLIENTS WE HAVE SERVED

United States Patent & Trademark Office

US Patent and Trademark Office

Federal Emergency Management Agency

Naval Air Systems Command

Army Network Enterprise Technology Command

Department of Veteran Affairs

Pension Benefit Guaranty Corporation

Amazon Web Services

How can we help?

Purple Jay, LLC is positioned to provide seasoned personnel to meet and exceed your expectations. Our personnel maintains proper and current OSCP, PMP, Security+ CE, CISSP, CISM, CCNA Security, CSPO, and CEH certifications.

Skilled Professionals at Your Service.

Terms and Conditions for Purple Jay, LLC

1. Services

Purple Jay, LLC specializes in providing innovative and tailored information security solutions to our clients. By using our website and services, you agree to the terms outlined below.

2. Messaging and Communication

  • Frequency: Visitors and clients may receive email communications related to inquiries, updates, service changes, or important notifications.

  • Opt-In: By providing your contact information on our website, you consent to receive communications from Purple Jay, LLC.

  • Opt-Out: You may opt-out of receiving emails by clicking "Unsubscribe" in any email communication or contacting us directly.

For further information on how we handle your personal information, please review our Privacy Policy.

3. Responsibilities

Purple Jay, LLC ensures that our team and services meet rigorous industry standards and comply with applicable regulations. Clients are responsible for providing accurate and timely information to support the delivery of our services.

4. Limitation of Liability

Purple Jay, LLC is not liable for any indirect, incidental, or consequential damages arising from the use of our website or services, including interruptions, delays, or errors. Clients agree to promptly inform Purple Jay, LLC of any issues or concerns to ensure timely resolution.

5. Intellectual Property

All content on the Purple Jay, LLC website, including but not limited to text, images, graphics, and code, is the property of Purple Jay, LLC and is protected by intellectual property laws. Unauthorized use or reproduction of this content is strictly prohibited.

6. Updates and Contact

These terms and conditions may be updated periodically. Any changes will become effective upon posting to our website. We encourage you to review these terms regularly.

For inquiries or assistance, you can contact us at:

  • Email: info@purplejay.io

  • Phone: (571) 430-2360

By accessing or using Purple Jay, LLC's website, you acknowledge and accept these Terms and Conditions, designed to ensure a secure and professional experience.